1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
4 years ago
12

What is a programming method that provides for interactive modules to a website?

Computers and Technology
1 answer:
Veseljchak [2.6K]4 years ago
8 0

Answer:

Java?

Explanation:

You might be interested in
Indicate whether the statement is true or false. ____ 1. Autoglobal array elements are referred to with an index number. ____ 2.
Masteriza [31]

Answer:

The answer to this question can be defined as follows:

For question 1,  it is "False".

For question 2, it is "True".

Explanation:

The index number refers to autoglobal array elements. To respond to either a global variable inside a method, users need the global keyword. It will omit the username for the dollar lead if you're using the variable as just an index to the $GLOBALS list, that's why question 1 is "False".

Its process attribute specifies how its form data could be sent (for the data files. This site is in the method category would have been sent). It process-data can be transmitted in URL variables (using method = "get") or HTTS (using method = "post") after transaction, that's why question 2 is "True".

7 0
3 years ago
Which of the following factors will have the greatest impact on your credit score?1. Length of credit history 11. Payment histor
irinina [24]
I believe your payment history would have the greatest impact on your credit score
4 0
4 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
Fire stick optimizing system storage and applications
vivado [14]

Answer:

IN MY PROFILE

Explanation:

I HAVE AWNSERED THIS QUESTION THROUGHOUT MY BEING HERE PLEASE DO NOT BE AFRAID TO CLICK ON MY PROFILE AND FIND THE ANSWER

5 0
3 years ago
Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two
Alexeev081 [22]

Answer:

In Python:

cprice= int(input("Current price: "))

lmonth= int(input("Last month's price: "))

print("This house is $"+str(cprice))

print("The change is $"+str(cprice-lmonth)+" since last month")

print("The current mortage $"+str((cprice * 0.051) / 12)+" since last month")

Explanation:

Get current price

cprice= int(input("Current price: "))

Get last month's price

lmonth= int(input("Last month's price: "))

Print the current price

print("This house is $"+str(cprice))

Print the change

print("The change is $"+str(cprice-lmonth)+" since last month")

Print the mortgage

print("The current mortage $"+str((cprice * 0.051) / 12)+" since last month")

8 0
3 years ago
Other questions:
  • â________________ software can sometimes be used to decrypt a drive that is utilizing whole disk encryption.
    15·1 answer
  • Why do nonprofit agencies often include blogs on their websites?
    5·1 answer
  • if you could take on the role as game designer and could change or add some type of financial aspect about the game what would b
    6·1 answer
  • Answer the following questions using the five different kinds of parallelism techniques: A - Instruction Level Parallelism B - D
    15·1 answer
  • Creating a Graphical User Interface in Java
    11·1 answer
  • Do these devices allow you to view photos using the cloud?
    10·1 answer
  • How does having weak security on your browser represent the weakest link in a network
    8·1 answer
  • Imagine that you are preparing a multimedia presentation. What are the four things you need to consider when getting started?
    14·2 answers
  • USE PYTHON TURTLE GRAPHICS
    15·1 answer
  • status is a non-volatile memory chip used for store translation data between personal computer PC and digital device ​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!